4.9 • 696 Ratings
🗓️ 11 July 2018
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Wednesday, July 11th, 2018 edition of the Sansa and Storm Center's |
0:07.0 | Stormcast. My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida. |
0:13.0 | Microsoft patched Tuesday today and we got patches for 54 different vulnerabilities, three of which were publicly disclosed by the time Microsoft got |
0:24.8 | around to patch them. Overall, however, this doesn't really look all that interesting. A lot of |
0:32.2 | these vulnerabilities that are being addressed are of course in web browsers, again sort of |
0:37.3 | JavaScript issues and like |
0:39.5 | things that yes you should patch quickly but nothing really that sort of sticks out |
0:45.7 | here. 17 out of the 54 or 53 if you don't count Adobe vulnerabilities are |
0:52.8 | critical. |
1:01.5 | What's almost more interesting than the official patches is a change that was made to Office 365 and that change does no longer allow the embedding of setting content MS files. |
1:09.8 | Remember, those were these XML files that actually could |
1:13.4 | include executable code. This was one way how attackers got reasonably around some of the |
1:21.0 | macro restrictions and such that we have in Office documents. Since this was changed in Office 365, there isn't really a patch or anything |
1:30.4 | that you need to apply for this particular issue. Now on Adobe's end, in addition to the |
1:37.8 | Adobe Flash Player update that we also have included in the Microsoft update. We also got updates for Adobe Experience Manager, Connect, and Acrobat and PDF Reader. |
1:51.6 | The last one, definitely don't forget that one, PDF Reader, is always a tempting target. |
1:59.1 | Even though in this case, Adobe only gives the Adobe Reader |
2:03.3 | patches a priority rating of two. So overall I think it's an average patch Tuesday. |
2:10.4 | Do focus on these browser issues. That's the most likely thing that's going to get |
2:16.5 | exploited and I really consider sort of |
2:18.8 | Adobe Flash part of this. So make sure that's all up to date. And then we got what looks like |
2:26.5 | a Miri variant going after Android devices that have the Android debug britcher ADB exposed. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.